According to OneKey's Chinese Twitter account, regarding the random number vulnerability implicated in the recent "Milk Sad" incident, the OneKey team clarified that the vulnerability does not affect the security of mnemonics and private keys in OneKey's software and hardware wallets. The vulnerability stems from Libbitcoin Explorer (bx) version 3.x, which uses a pseudo-random number generator based on the system time and the Mersenne Twister-32 algorithm. This seed space is limited to 2³² bits, allowing attackers to derive private keys through prediction or brute force. This vulnerability affects some older versions of Trust Wallet and all products using bx 3.x or older versions of Trust Wallet Core. OneKey stated that its hardware wallets utilize an EAL6+ security chip with a built-in TRNG true random number generator; older devices have also passed SP800-22 and FIPS140-2 entropy testing. The software wallet uses a system-level CSPRNG entropy source to generate random numbers, complying with cryptographic standards. The team emphasized that users are advised to use hardware wallets to manage their assets and should not import mnemonics generated by software wallets into hardware wallets to ensure maximum security.